The following pages link to Shujun Li (Q552767):
Displaying 39 items.
- Cryptanalysis of a discrete-time synchronous chaotic encryption system (Q552769) (← links)
- Cryptanalysis of a computer cryptography scheme based on a filter bank (Q602330) (← links)
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm (Q602619) (← links)
- Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems (Q641327) (← links)
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision (Q709409) (← links)
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations (Q715909) (← links)
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers (Q718384) (← links)
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps (Q718387) (← links)
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis (Q720254) (← links)
- Cryptanalysis of a chaotic block cipher with external key and its improved version (Q929144) (← links)
- Breaking an encryption scheme based on chaotic baker map (Q973548) (← links)
- Comment on ``Image encryption with chaotically coupled chaotic maps'' (Q979114) (← links)
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization (Q1772887) (← links)
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems (Q1854580) (← links)
- A new trust region filter algorithm (Q2378945) (← links)
- Baptista-type chaotic cryptosystems: problems and countermeasures (Q2463070) (← links)
- Breaking a chaos-based secure communication scheme designed by an improved modulation method (Q2483654) (← links)
- A more secure chaotic cryptographic scheme based on the dynamic look-up table (Q2508460) (← links)
- Cryptanalysis of a new signal security system for multimedia data transmission (Q2570576) (← links)
- Cryptanalysis of the Convex Hull Click Human Identification Protocol (Q3073778) (← links)
- Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers (Q3090973) (← links)
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY (Q3398015) (← links)
- (Q3414284) (← links)
- RETURN-MAP CRYPTANALYSIS REVISITED (Q3498658) (← links)
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS (Q3579255) (← links)
- A Fast Integration Method and Its Application in a Medical Physics Problem (Q3603102) (← links)
- (Q4538269) (← links)
- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding (Q4550269) (← links)
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS (Q4655524) (← links)
- (Q4788589) (← links)
- Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks (Q5007631) (← links)
- Leveling the Grid (Q5233716) (← links)
- DISTRIBUTED ADAPTIVE MULTIVARIATE FUNCTION VISUALIZATION (Q5294598) (← links)
- (Q5319487) (← links)
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS (Q5474342) (← links)
- Advances in Neural Networks – ISNN 2005 (Q5707163) (← links)
- Computational Science – ICCS 2005 (Q5709508) (← links)
- Computational Science – ICCS 2005 (Q5709513) (← links)
- (Q5874922) (← links)